Abstract | ||
---|---|---|
Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific risk evaluation approach that uses various security attributes of the cloud (e.g., vulnerability information, the probability of an attack, and the impact of each attack ass... |
Year | DOI | Venue |
---|---|---|
2021 | 10.1109/TCC.2018.2883063 | IEEE Transactions on Cloud Computing |
Keywords | DocType | Volume |
Cloud computing,Risk management,Software tools,Computer crime,Computer science,Organizations | Journal | 9 |
Issue | ISSN | Citations |
2 | 2168-7161 | 0 |
PageRank | References | Authors |
0.34 | 0 | 7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Armstrong Nhlabatsi | 1 | 25 | 5.65 |
Jin B. Hong | 2 | 120 | 17.50 |
Dong Seong Dan Kim | 3 | 0 | 0.34 |
Rachael Fernandez | 4 | 0 | 0.68 |
Alaa Hussein | 5 | 3 | 1.07 |
Noora Fetais | 6 | 3 | 2.76 |
Khaled M. Khan | 7 | 295 | 29.63 |